首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
计算机
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of message
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of message
admin
2023-02-13
110
问题
Symmetric-key cryptosystems use the ________ key for encryption and decryption of a message,though a message or group of messages may have a different key than others.A significant disadvantage of symmetric ciphers is the key management necessary to use them securely.Each distinct pair of communicating parties must,ideally,share a different key,and perhaps each ciphertext exchanged as well.The number of keys required increases as the square of the number of network members,which very quickly requires complex key management schemes to keep them all straight and secret.The difficulty of securely establishing a secret ________between two communicating parties,when a secure channel doesn’t already exist between them,also presents a chicken—and—egg problem which is a considerable practical obstacle for cryptography users in the real world.
Whitfield Diffie and Martin Hellman,authors of the first paper on public—key cryptography.
In a groundbreaking 1 976 paper,Whitfield Diffie and Martin Hellman proposed the notion of public—key(also,more generally,called asymmetric key)cryptography in which two different but mathematically related keys are used——a public key and a private key.A public key system is so constructed that calculation of one key(the private key)is computationally infeasible ________ the other(the public key),even though they are necessarily related.Instead,both keys are generated secretly,as an interrelated pair.The historian David Kahn described public—key cryptography as “the most revolutionary new concept in the field since poly—alphabetic substitution emerged in the Renaissance”.
In public-key cryptosystems,the ________ key may be freely distributed,while its paired private key must remain secret.The public key is typically used for encryption,while the private or secret key is used for decryption.Diffie and Hellman showed that public-key cryptography was possible by presenting the Diffie—Hellman key exchange protocol.
In 1978,Ronald Rivest,Adi Shamir,and Len Adleman invented ________,another public—key system.
In 1997,it finally became publicly known that asymmetric key cryptography had been invented by James H.Ellis at GCHQ,a British intelligence organization,and that,in the early 1970s,both the Diffie—Hellman and RSA algorithms had been previously developed(by Malcolm J.Williamson and Clifford Cocks,respectively).
③
选项
A、from
B、in
C、to
D、of
答案
A
解析
转载请注明原文地址:https://www.kaotiyun.com/show/nF0D777K
本试题收录于:
信息安全工程师上午基础知识考试题库软考中级分类
0
信息安全工程师上午基础知识考试
软考中级
相关试题推荐
如果危机发生时,公司能够采取非常有效的办法来消除危机,实际上能够增加公司的声誉。一个非常好的声誉,可能因为一个事件,转眼就被破坏;而一个不好的声誉,往往需要很长时间的努力才能消除它。如果以上陈述为真,则最能支持以下哪项陈述?
论说文:根据下述材料,写一篇700字左右的论说文,题目自拟。一位商人买下了一块晶莹剔透、大如蛋黄的钻石,他请专家检验,专家大加赞赏,但为钻石中有道裂纹表示惋惜,并说:“如果沿着裂纹切割成两块,能使钻石增值,只是一旦失败,损失就大了。”怎样切割这块
论证有效性分析:分析下述论证中存在的缺陷和漏洞,选择若干要点,写一篇600字左右的文章,对该论证的有效性进行分析和评论。(论证有效性分析的一般要点是:概念特别是核心概念的界定和使用是否准确并前后一致,有无各种明显的逻辑错误,论证的论据是否成立并支持结论,结
结合材料回答问题:材料1“演艺先做人,做人德为先”,演艺人员作为公众人物,背后有成千上万喜爱、支持他们的人,理应在遵纪守法、道德品行方面以身作则。多年来,很多演艺人员,在这方面做得很好,深得公众认可和尊敬,他们的演艺事业也不断攀登新的高峰。当然
2021年5月21日,习近平主席应邀在北京以视频方式出席全球健康峰会,并发表题为《携手共建人类卫生健康共同体》的重要讲话。习近平主席指出,一年多来,新冠肺炎疫情起伏反复,百年来最严重的传染病大流行仍在肆虐。二十国集团成员应该在全球抗疫合作中扛起责任,着力提
邓小平理论使改革开放后的中国发生了天翻地覆的变化,迎来了思想的解放、经济的发展、政治的昌明、教育的勃兴、文艺的繁荣、科学的春天。邓小平理论形成的历史根据是()
资本所有者把从劳动者那里赚来的剩余价值的一部分用于个人消费,另一部分转化为资本,用于购买扩大生产规模所需追加的资本要素和劳动要素。资本积累是生产发展的必然趋势,其导致的社会现象包括()
1949年3月,在中国人民革命即将取得全国胜利的前夕,中国共产党在河北省平山县西柏坡村召开了中共七届二中全会。下列关于七届二中全会的表述,正确的是()
Mostmalesintheanimalkingdomdolittleparenting.Sometimes,though,parentalinvestmentbyamalepaysoff.Songbirdchicks
随机试题
甘麦大枣汤的功用酸枣仁汤的功用
治疗紫斑之阴虚火旺证,方用
引起亚急性细菌性心内膜最常见的病原菌是()。
防水层外观检查要求,正确的包括()。
某港口,原有航道全长10km、深8.5m、底宽90m,原有1号港池6个泊位,现拟在1号港池旁扩建2号港池,并加深原航道,利用航道开挖土回填2号港池码头后方堆场。问题:本工程宜投入的主要设备和船舶。
下列设备中,可以将图片输入到计算机内的设备是()。
国际储备包括()。
在一次美术活动中,阳阳画了一个黑色的苹果,老师看到后生气地说:“你这画的是什么!苹果有黑色的吗?重新画!”请就此回答以下问题。幼儿园美育的途径有哪些?
[说明]同任何事物一样,软件也有一个孕育、诞生、成长、成熟、衰亡的过程,这就是软件的生存周期,在软件生存周期内对所产生的各种文档、程序和数据进行管理和变更控制的最重要的手段就是进行软件配置管理。
A、Inafactory.B、Inabank.C、Inashop.D、Inabookstore.BW:MayIwithdraw100dollars?M:Allright,justamoment,please.
最新回复
(
0
)